<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Report a security vulnerability in Troubleshooting</title>
    <link>https://community.dynatrace.com/t5/Troubleshooting/Report-a-security-vulnerability/ta-p/195675</link>
    <description>&lt;P class="lia-message-template-symptoms-zone"&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;This is a Self Service Diagnostics article of type &lt;FONT color="#FF9900"&gt;&lt;STRONG&gt;Partial-Self-Service&lt;/STRONG&gt;&lt;/FONT&gt;.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;DIV class="lia-message-template-symptoms-zone"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;H2&gt;Self Service Summary&lt;/H2&gt;
&lt;TABLE border="1" cellpadding="10"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Tasks&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Alternative&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;A Dynatrace component is suspected to be vulnerable.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Get in touch with Support after&amp;nbsp;and checking&amp;nbsp;&lt;A class="anchor" href="https://cve-status.dynatrace.com/" target="_blank" rel="noopener"&gt;cve-status.dynatrace.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;OL class="list list--ordered list"&gt;
&lt;LI&gt;
&lt;P&gt;Check&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Dynatrace CVE status (Common Vulnerabilities and Exposures)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="anchor" href="https://cve-status.dynatrace.com/" target="_blank" rel="noopener"&gt;cve-status.dynatrace.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for summaries of known vulnerabilities and exposures in Dynatrace components.&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;If no one else has reported the problem, create a support ticket.&lt;/P&gt;
&lt;OL class="list list--unordered list"&gt;
&lt;LI&gt;
&lt;P&gt;Gather below listed information with your security team.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consider&lt;/STRONG&gt; below listed &lt;STRONG&gt;best practices for scanning&lt;/STRONG&gt; a Dynatrace component.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consider tips&lt;/STRONG&gt;&amp;nbsp;after scanning and&amp;nbsp;&lt;STRONG&gt;before reporting scan results&lt;/STRONG&gt; to Dynatrace for a quick resolution.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Create the ticket using&amp;nbsp;&lt;A class="anchor" href="https://one.dynatrace.com/hc/en-us/requests/new?securityrequest=true" target="_blank" rel="noopener"&gt;this&lt;/A&gt;&amp;nbsp;link.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Search CVE-# within the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/whats-new/release-notes" target="_self"&gt;Release Notes&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Support Ticket Content&lt;/H2&gt;
&lt;P&gt;Work with your Security Team to provide the following Self Service Diagnostics:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN class=""&gt;Dynatrace component:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Which component incl. &lt;STRONG&gt;version&lt;/STRONG&gt; is suspected to be vulnerable (&lt;SPAN&gt;e.g. SaaS 1.240, Managed 1.240, OneAgent 1.240, ActiveGate 1.239)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Which deployment type was used: Installer or &lt;STRONG&gt;container image&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class=""&gt;Vulnerability source and details:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Describe how the vulnerability was found and attach if applicable:
&lt;UL&gt;
&lt;LI&gt;CVE-#&lt;/LI&gt;
&lt;LI&gt;Tool/scanner name&lt;/LI&gt;
&lt;LI&gt;Path to the affected library&lt;/LI&gt;
&lt;LI&gt;Complete report/test result&lt;/LI&gt;
&lt;LI&gt;How to reproduce the security concern/pentest (e.g. attack vector, exploit)&lt;/LI&gt;
&lt;LI&gt;Severity level or CVSS&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class=""&gt;Required update:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;As a customer, I want to know e.g.
&lt;UL&gt;
&lt;LI&gt;If I am affected&lt;/LI&gt;
&lt;LI&gt;How I am affected&lt;/LI&gt;
&lt;LI&gt;If it is of high severity&lt;/LI&gt;
&lt;LI&gt;In which version it will be fixed&lt;/LI&gt;
&lt;LI&gt;When the fix version will be available&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2&gt;What / how to scan&lt;/H2&gt;
&lt;UL class="ak-ul" data-indent-level="1"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="476"&gt;&lt;STRONG&gt;Scan&lt;/STRONG&gt; and report security findings for &lt;STRONG&gt;the latest version of the Dynatrace component.&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="ak-ul" data-indent-level="2"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="596"&gt;We officially support many versions of OneAgent, ActiveGate, Operator, etc. but our development teams will not re-release an old version, unless there is evidence that we are indeed affected by a vulnerability, or the vulnerability is highly severe and we cannot rule out the likelihood of practical exploitation.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="913"&gt;CVEs related to operating system components (curl, glibc, gnutls, etc.) can only be fixed by updating the used container base images. We do not maintain these base images ourselves but use minimal and hardened base images from external publishers.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Dynatrace SBOMs include a detailed inventory of software components and dependencies. They enable effective vulnerability management, identification of license compliance issues, and support end-to-end visibility of supply chain risks.&amp;nbsp;&lt;/SPAN&gt;When scanning Dynatrace Operator or ActiveGate, you can scan the&amp;nbsp;&lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;sbom.json&lt;/CODE&gt;&amp;nbsp;directly (see&amp;nbsp;&lt;A class="cc-1rn59kg" title="https://docs.dynatrace.com/docs/setup-and-configuration/setup-on-k8s/guides/container-registries/verify-image-signature#sbom-attestation-verification" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/guides/container-registries/verify-image-signature#sbom-attestation-verification" target="_blank" rel="noopener" data-testid="link-with-safety" data-renderer-mark="true"&gt;Software Bill of Materials (SBOM)&lt;/A&gt;&amp;nbsp;on how to "&lt;SPAN&gt;Retrieve SBOM file from verification output"). Examples:&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A href="https://github.com/google/osv-scanner/releases" target="_self"&gt;OSV scanner&lt;/A&gt;: &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;osv-scanner scan --sbom sbom.json&lt;/CODE&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A href="https://github.com/aquasecurity/trivy/releases" target="_self"&gt;Trivy scanner&lt;/A&gt;: &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;trivy -q sbom sbom.json&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="1166"&gt;When scanning Dynatrace container images for vulnerabilities, &lt;STRONG&gt;perform&amp;nbsp;security checks on the static, non-running image.&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="ak-ul" data-indent-level="2"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="1301"&gt;Some scanning appliances collect insights from running container workloads. The problem with this type of dynamic check is that scanners often cannot distinguish whether a security problem actually affects our image or the environment it is running in. Our development teams cannot make statements about CVEs that relate to components outside of our control and it is the customer’s responsibility to ensure that they are up to date.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="1738"&gt;If scanning tools are technically limited to checking only running container workloads, it is crucial that customers triage found CVEs upfront and filter out any items that have no obvious connection to OneAgent, ActiveGate, or Operator in their respective file paths.&lt;/P&gt;
&lt;UL class="ak-ul" data-indent-level="3"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2010"&gt;Dynatrace assets are typically located in paths, such as &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;/opt/dynatrace&lt;/CODE&gt; , &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;/var/lib/dynatrace&lt;/CODE&gt; or &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;/var/log/dynatrace&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1 id="What-to-check-after-the-scan" data-renderer-start-pos="2133"&gt;What to check after the scan&lt;/H1&gt;
&lt;UL class="ak-ul" data-indent-level="1"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2165"&gt;Check if there is a Dynatrace setting for the affected component, e.g. ActiveGate or Managed certificates are managed on your/customer side. See also:&amp;nbsp;&lt;SPAN&gt;&lt;SPAN aria-expanded="false" aria-haspopup="true" data-testid="hover-card-trigger-wrapper"&gt;&lt;A class="css-118vsk3 e26bri0" tabindex="0" role="button" href="https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-insecure-ciphers/ta-p/239631" target="_blank" rel="noopener" data-testid="inline-card-resolved-view"&gt;&lt;SPAN class="css-1cwva94 e1a3lu072" data-testid="inline-card-icon-and-title"&gt;&lt;SPAN class="smart-link-title-wrapper css-0 e1a3lu077"&gt;VA scan shows insecure cipher / certificate&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2312"&gt;Check if a newer version of Dynatrace OneAgent, ActiveGate, Operator, etc. is available. If yes, update and then repeat the scan process.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2453"&gt;To check the status of individual CVEs, see if a statement available on &lt;A class="cc-1rn59kg" title="https://cve-status.dynatrace.com/" href="https://cve-status.dynatrace.com/" target="_blank" rel="noopener" data-testid="link-with-safety" data-renderer-mark="true"&gt;https://cve-status.dynatrace.com&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2914"&gt;When reporting CVEs for scanned container images, it is important to &lt;STRONG data-renderer-mark="true"&gt;provide an exact image identifier&lt;/STRONG&gt; (where it was downloaded from), &lt;STRONG&gt;to indicate &lt;/STRONG&gt;which &lt;STRONG&gt;version&lt;/STRONG&gt; was scanned, &lt;STRONG&gt;and&amp;nbsp;&lt;/STRONG&gt;which &lt;STRONG&gt;scanner&lt;/STRONG&gt; was used.&lt;/P&gt;
&lt;UL class="ak-ul" data-indent-level="2"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="3119"&gt;Note that &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;latest&lt;/CODE&gt; is not a valid version. It is a tag that always references the newest version and is reset whenever a new release is published.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="3267"&gt;Dynatrace Operator downloads OneAgent. CVE findings related to OneAgent are often falsely reported as impacting DT Operator. A good indicator to spot that findings are related to OneAgent is if the scanned image also includes an identifier, such as &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;linux/oneagent&lt;/CODE&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2561"&gt;If Dynatrace Operator or ActiveGate is scanned, you can refer to its &lt;A class="cc-1rn59kg" title="https://docs.dynatrace.com/docs/setup-and-configuration/setup-on-k8s/guides/container-registries/verify-image-signature#sbom-attestation-verification" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/guides/container-registries/verify-image-signature#sbom-attestation-verification" target="_blank" rel="noopener" data-testid="link-with-safety" data-renderer-mark="true"&gt;Software Bill of Materials (SBOM)&lt;/A&gt; to obtain a list of all components included. Only CVE findings that relate to one of the shipped components can potentially be handled by Dynatrace.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2804"&gt;For other assets, you can find the components in the corresponding open source report file provided in our &lt;A class="cc-1rn59kg" title="https://www.dynatrace.com/company/trust-center/customers/reports/" href="https://www.dynatrace.com/company/trust-center/customers/reports/" target="_blank" rel="noopener" data-testid="link-with-safety" data-renderer-mark="true"&gt;Trust Center&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 30 Apr 2026 09:23:38 GMT</pubDate>
    <dc:creator>stefanie_pachne</dc:creator>
    <dc:date>2026-04-30T09:23:38Z</dc:date>
    <item>
      <title>Report a security vulnerability</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/Report-a-security-vulnerability/ta-p/195675</link>
      <description>&lt;P class="lia-message-template-symptoms-zone"&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;This is a Self Service Diagnostics article of type &lt;FONT color="#FF9900"&gt;&lt;STRONG&gt;Partial-Self-Service&lt;/STRONG&gt;&lt;/FONT&gt;.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;DIV class="lia-message-template-symptoms-zone"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;
&lt;H2&gt;Self Service Summary&lt;/H2&gt;
&lt;TABLE border="1" cellpadding="10"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Tasks&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;Alternative&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;A Dynatrace component is suspected to be vulnerable.&lt;/SPAN&gt;&lt;/TD&gt;
&lt;TD&gt;
&lt;P&gt;&lt;SPAN class=""&gt;Get in touch with Support after&amp;nbsp;and checking&amp;nbsp;&lt;A class="anchor" href="https://cve-status.dynatrace.com/" target="_blank" rel="noopener"&gt;cve-status.dynatrace.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;
&lt;OL class="list list--ordered list"&gt;
&lt;LI&gt;
&lt;P&gt;Check&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Dynatrace CVE status (Common Vulnerabilities and Exposures)&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page at&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="anchor" href="https://cve-status.dynatrace.com/" target="_blank" rel="noopener"&gt;cve-status.dynatrace.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;for summaries of known vulnerabilities and exposures in Dynatrace components.&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;If no one else has reported the problem, create a support ticket.&lt;/P&gt;
&lt;OL class="list list--unordered list"&gt;
&lt;LI&gt;
&lt;P&gt;Gather below listed information with your security team.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consider&lt;/STRONG&gt; below listed &lt;STRONG&gt;best practices for scanning&lt;/STRONG&gt; a Dynatrace component.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Consider tips&lt;/STRONG&gt;&amp;nbsp;after scanning and&amp;nbsp;&lt;STRONG&gt;before reporting scan results&lt;/STRONG&gt; to Dynatrace for a quick resolution.&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Create the ticket using&amp;nbsp;&lt;A class="anchor" href="https://one.dynatrace.com/hc/en-us/requests/new?securityrequest=true" target="_blank" rel="noopener"&gt;this&lt;/A&gt;&amp;nbsp;link.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;SPAN class=""&gt;Search CVE-# within the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.dynatrace.com/support/help/whats-new/release-notes" target="_self"&gt;Release Notes&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Support Ticket Content&lt;/H2&gt;
&lt;P&gt;Work with your Security Team to provide the following Self Service Diagnostics:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN class=""&gt;Dynatrace component:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Which component incl. &lt;STRONG&gt;version&lt;/STRONG&gt; is suspected to be vulnerable (&lt;SPAN&gt;e.g. SaaS 1.240, Managed 1.240, OneAgent 1.240, ActiveGate 1.239)&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Which deployment type was used: Installer or &lt;STRONG&gt;container image&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class=""&gt;Vulnerability source and details:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Describe how the vulnerability was found and attach if applicable:
&lt;UL&gt;
&lt;LI&gt;CVE-#&lt;/LI&gt;
&lt;LI&gt;Tool/scanner name&lt;/LI&gt;
&lt;LI&gt;Path to the affected library&lt;/LI&gt;
&lt;LI&gt;Complete report/test result&lt;/LI&gt;
&lt;LI&gt;How to reproduce the security concern/pentest (e.g. attack vector, exploit)&lt;/LI&gt;
&lt;LI&gt;Severity level or CVSS&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class=""&gt;Required update:&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;As a customer, I want to know e.g.
&lt;UL&gt;
&lt;LI&gt;If I am affected&lt;/LI&gt;
&lt;LI&gt;How I am affected&lt;/LI&gt;
&lt;LI&gt;If it is of high severity&lt;/LI&gt;
&lt;LI&gt;In which version it will be fixed&lt;/LI&gt;
&lt;LI&gt;When the fix version will be available&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;H2&gt;What / how to scan&lt;/H2&gt;
&lt;UL class="ak-ul" data-indent-level="1"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="476"&gt;&lt;STRONG&gt;Scan&lt;/STRONG&gt; and report security findings for &lt;STRONG&gt;the latest version of the Dynatrace component.&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="ak-ul" data-indent-level="2"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="596"&gt;We officially support many versions of OneAgent, ActiveGate, Operator, etc. but our development teams will not re-release an old version, unless there is evidence that we are indeed affected by a vulnerability, or the vulnerability is highly severe and we cannot rule out the likelihood of practical exploitation.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="913"&gt;CVEs related to operating system components (curl, glibc, gnutls, etc.) can only be fixed by updating the used container base images. We do not maintain these base images ourselves but use minimal and hardened base images from external publishers.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Dynatrace SBOMs include a detailed inventory of software components and dependencies. They enable effective vulnerability management, identification of license compliance issues, and support end-to-end visibility of supply chain risks.&amp;nbsp;&lt;/SPAN&gt;When scanning Dynatrace Operator or ActiveGate, you can scan the&amp;nbsp;&lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;sbom.json&lt;/CODE&gt;&amp;nbsp;directly (see&amp;nbsp;&lt;A class="cc-1rn59kg" title="https://docs.dynatrace.com/docs/setup-and-configuration/setup-on-k8s/guides/container-registries/verify-image-signature#sbom-attestation-verification" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/guides/container-registries/verify-image-signature#sbom-attestation-verification" target="_blank" rel="noopener" data-testid="link-with-safety" data-renderer-mark="true"&gt;Software Bill of Materials (SBOM)&lt;/A&gt;&amp;nbsp;on how to "&lt;SPAN&gt;Retrieve SBOM file from verification output"). Examples:&lt;/SPAN&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A href="https://github.com/google/osv-scanner/releases" target="_self"&gt;OSV scanner&lt;/A&gt;: &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;osv-scanner scan --sbom sbom.json&lt;/CODE&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;A href="https://github.com/aquasecurity/trivy/releases" target="_self"&gt;Trivy scanner&lt;/A&gt;: &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;trivy -q sbom sbom.json&lt;/CODE&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="1166"&gt;When scanning Dynatrace container images for vulnerabilities, &lt;STRONG&gt;perform&amp;nbsp;security checks on the static, non-running image.&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="ak-ul" data-indent-level="2"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="1301"&gt;Some scanning appliances collect insights from running container workloads. The problem with this type of dynamic check is that scanners often cannot distinguish whether a security problem actually affects our image or the environment it is running in. Our development teams cannot make statements about CVEs that relate to components outside of our control and it is the customer’s responsibility to ensure that they are up to date.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="1738"&gt;If scanning tools are technically limited to checking only running container workloads, it is crucial that customers triage found CVEs upfront and filter out any items that have no obvious connection to OneAgent, ActiveGate, or Operator in their respective file paths.&lt;/P&gt;
&lt;UL class="ak-ul" data-indent-level="3"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2010"&gt;Dynatrace assets are typically located in paths, such as &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;/opt/dynatrace&lt;/CODE&gt; , &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;/var/lib/dynatrace&lt;/CODE&gt; or &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;/var/log/dynatrace&lt;/CODE&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H1 id="What-to-check-after-the-scan" data-renderer-start-pos="2133"&gt;What to check after the scan&lt;/H1&gt;
&lt;UL class="ak-ul" data-indent-level="1"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2165"&gt;Check if there is a Dynatrace setting for the affected component, e.g. ActiveGate or Managed certificates are managed on your/customer side. See also:&amp;nbsp;&lt;SPAN&gt;&lt;SPAN aria-expanded="false" aria-haspopup="true" data-testid="hover-card-trigger-wrapper"&gt;&lt;A class="css-118vsk3 e26bri0" tabindex="0" role="button" href="https://community.dynatrace.com/t5/Troubleshooting/VA-scan-shows-insecure-ciphers/ta-p/239631" target="_blank" rel="noopener" data-testid="inline-card-resolved-view"&gt;&lt;SPAN class="css-1cwva94 e1a3lu072" data-testid="inline-card-icon-and-title"&gt;&lt;SPAN class="smart-link-title-wrapper css-0 e1a3lu077"&gt;VA scan shows insecure cipher / certificate&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2312"&gt;Check if a newer version of Dynatrace OneAgent, ActiveGate, Operator, etc. is available. If yes, update and then repeat the scan process.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2453"&gt;To check the status of individual CVEs, see if a statement available on &lt;A class="cc-1rn59kg" title="https://cve-status.dynatrace.com/" href="https://cve-status.dynatrace.com/" target="_blank" rel="noopener" data-testid="link-with-safety" data-renderer-mark="true"&gt;https://cve-status.dynatrace.com&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2914"&gt;When reporting CVEs for scanned container images, it is important to &lt;STRONG data-renderer-mark="true"&gt;provide an exact image identifier&lt;/STRONG&gt; (where it was downloaded from), &lt;STRONG&gt;to indicate &lt;/STRONG&gt;which &lt;STRONG&gt;version&lt;/STRONG&gt; was scanned, &lt;STRONG&gt;and&amp;nbsp;&lt;/STRONG&gt;which &lt;STRONG&gt;scanner&lt;/STRONG&gt; was used.&lt;/P&gt;
&lt;UL class="ak-ul" data-indent-level="2"&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="3119"&gt;Note that &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;latest&lt;/CODE&gt; is not a valid version. It is a tag that always references the newest version and is reset whenever a new release is published.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="3267"&gt;Dynatrace Operator downloads OneAgent. CVE findings related to OneAgent are often falsely reported as impacting DT Operator. A good indicator to spot that findings are related to OneAgent is if the scanned image also includes an identifier, such as &lt;CODE class="code cc-1o5d2cw" data-renderer-mark="true"&gt;linux/oneagent&lt;/CODE&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2561"&gt;If Dynatrace Operator or ActiveGate is scanned, you can refer to its &lt;A class="cc-1rn59kg" title="https://docs.dynatrace.com/docs/setup-and-configuration/setup-on-k8s/guides/container-registries/verify-image-signature#sbom-attestation-verification" href="https://docs.dynatrace.com/docs/ingest-from/setup-on-k8s/guides/container-registries/verify-image-signature#sbom-attestation-verification" target="_blank" rel="noopener" data-testid="link-with-safety" data-renderer-mark="true"&gt;Software Bill of Materials (SBOM)&lt;/A&gt; to obtain a list of all components included. Only CVE findings that relate to one of the shipped components can potentially be handled by Dynatrace.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P data-renderer-start-pos="2804"&gt;For other assets, you can find the components in the corresponding open source report file provided in our &lt;A class="cc-1rn59kg" title="https://www.dynatrace.com/company/trust-center/customers/reports/" href="https://www.dynatrace.com/company/trust-center/customers/reports/" target="_blank" rel="noopener" data-testid="link-with-safety" data-renderer-mark="true"&gt;Trust Center&lt;/A&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 30 Apr 2026 09:23:38 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/Report-a-security-vulnerability/ta-p/195675</guid>
      <dc:creator>stefanie_pachne</dc:creator>
      <dc:date>2026-04-30T09:23:38Z</dc:date>
    </item>
    <item>
      <title>Re: Security vulnerability</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/Report-a-security-vulnerability/tac-p/202010#M87</link>
      <description>&lt;P&gt;Great&amp;nbsp; template, thanks&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/28409"&gt;@stefanie_pachne&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Jan 2023 13:57:46 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/Report-a-security-vulnerability/tac-p/202010#M87</guid>
      <dc:creator>ChadTurner</dc:creator>
      <dc:date>2023-01-10T13:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: Report a security vulnerability</title>
      <link>https://community.dynatrace.com/t5/Troubleshooting/Report-a-security-vulnerability/tac-p/250379#M696</link>
      <description>&lt;P&gt;This is great.&lt;/P&gt;&lt;P&gt;Please update to add&amp;nbsp;CVE-2023-6597 which is not on the list.&amp;nbsp; FYI........I did put in a ticket for this first.&amp;nbsp; Feel free to email me and I can share ticket.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 13:06:30 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Troubleshooting/Report-a-security-vulnerability/tac-p/250379#M696</guid>
      <dc:creator>Kenny_Gillette</dc:creator>
      <dc:date>2024-07-11T13:06:30Z</dc:date>
    </item>
  </channel>
</rss>

